Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.

Backdoor.Makadocs

Results for Backdoor.Makadocs

It is important for malware authors to keep a solid network connection between their malware on compromised computers and their own servers so that the malware can receive commands and be updated. However, communication between the malware and the ...
Blog Entry by Takashi Katsuki | 25 Jan 2013 | 0 comments
Initially, I thought that Backdoor.Makadocs was a simple and typical back door Trojan horse. It receives and executes commands from a command-and-control (C&C) server and it gathers information from the compromised computer including the host ...
Blog Entry by Takashi Katsuki | 19 Nov 2012 | 0 comments
当初は、 Backdoor.Makadocs も従来と変わらない単純なバックドア型のトロイの木馬だろうと考えていました。Backdoor.Makadocs はコマンド & コントロール(C&C)サーバーからコマンドを受け取って実行し、ホスト名やオペレーティングシステムのタイプといった情報を侵入先のコンピュータから収集します。しかし、このマルウェアの作成者は侵入先のコンピュータで Windows 8 または Windows Server 2012 ...
Blog Entry by Takashi Katsuki | 18 Nov 2012 | 0 comments
Initially, I thought that Backdoor.Makadocs was a simple and typical back door Trojan horse. It receives and executes commands from a command-and-control (C&C) server and it gathers information from the compromised computer including the host ...
Blog Entry by Takashi Katsuki | 16 Nov 2012 | 0 comments